ASLR & Stack Protection
Address Space Layout Randomization, stack canaries, and exploit mitigation techniques
Address Space Layout Randomization, stack canaries, and exploit mitigation techniques
Learn to read and write simple programs in x86 and ARM assembly, understanding registers, instructions, and the art of thinking in low-level operations.
Understanding AND, OR, NOT gates and how they combine into arithmetic logic units — the building blocks of every processor.
From BIOS POST to kernel initialization and user space startup — understanding how your operating system comes to life.
How operating systems cache disk blocks in RAM, the difference between write-back and write-through caching, and how sync semantics work.
How the CPU cache hierarchy works, what cache coherence protocols do, and how the OS manages buffer cache and write policies in the page cache.
Implement a functional CPU simulator in Python that demonstrates the fetch-decode-execute cycle, register file, ALU operations, and memory access.
Deadlock conditions (Coffman), prevention strategies, detection & recovery
Explore character vs block devices, driver layers, and kernel vs user mode drivers in modern operating systems.
How file systems implement directories through linear search, hash tables, and B-trees, enabling efficient path resolution and file lookup operations.